outp.c will convert .s files to shell code.
a73e95b1db0a4a21d695a880d2485a1846a07cce539dcd13bafb1682d7bf7492
vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit
6477942c86ee6dd52bac80bf956cbed6863e52d464ae92b66bef9d20f7902b03
vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)
189114c1fe799648b677c16aa36fcc179942f685bacb5b0318c678f0cb0f01b9
TESO Security Advisory #9 - BinTec router security and privacy weakness. By using SNMP brute-force-techniques for SNMP community-names one is able to remotely gain the management accounts passwords, which are the same as the SNMP community names. Additionally the MIB-Tree holds security related information which should not be accessible through read-only/SNMP. These routers also offer services which can be abused rather easily, like dialing out and getting full line access via a CAPI interface, or a debugging interface which gives you all information which is sent over the BRI-lines.
1e4c21598191f4df1d64c9019b1d5c2ae2c88d693bdec2cd20552f3e94bb6c36
Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Many examples included.
4de0a0428ffc7564260f6144a3a67a196db6c7af7dba15d6564be3207bbc83ca
TESO Security Advisory - A vulnerability within the kreatecd application for Linux has been discovered. An attacker can gain local root-access. Exploit included.
6b75b08c163190a2f48460df04026108041a65be6542f340bc2ebbebc83a7a66
TESO Security Advisory - A vulnerability within the imwheel application for Linux has been discovered. Some of these packages are shipped with an suid-root wrapper-script that invokes the insecure program 'imwheel' with UID 0. Exploit included.
ce2cf3b23cb544a222d43c6fcfc4168a3bd18450577b959771583ecb4a486ae2
TESO Security Advisory - A vulnerability within the wmcdplay CD playing application for the WindowMaker desktop has been discovered. It allows local root compromise through arbitrary code execution.Any system which has wmcdplay installed as setuid root is vulnerable.
8d5071c1366d929bea61249f0900db3205b2b45ad04b4e9179fa21f235aaefe6
TESO Security Advisory - The atsar application contains an exploitable vulnerability. The Halloween 4 Linux distribution, which is based on RedHat 6.1 is shipped with this suid-root program. It might be used to gain superuser privileges. Any system that has atsar-linux-1.4.2 package installed is vulnerable.
506159ce20ba014e7a4a853444879fe6306bfc6bad43dc564b8b124ccdf79f23
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
de0bab345dbca650c8fba76d3b81c49404b82ffab4ed6d2f4539a87d2aad15ba
Exploit for BIND-8.2/8.2.1 (NXT)
a3fbc75a1aa8873673755bf4b5bbef3765a95fedb9fe5669407df0df343c734f
Nameserver traffic amplify (DNS Smurf) and NS Route discovery (DNS Traceroute) advisory and exploit.
0aaca81a09dcafa2ee112e0e4ed74641b4256e9d1f814bdb86735574a73c2f9f
Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Examples included.
f79551c7c0968751b9e2c04ed2b7d01a68b0bd7e81029b1fdf67696e615a7dd7
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
ba742bd9a58e200fbed9a58044af03f4d0429b7fba2352ea510f2278ffe69410
Linux Kernel 2.0.x and 2.2.x local Denial of Service attack
65c147bd308b43fb3a8d7302ab87c8828f6d771f4a9f3744fbc7ec2aae17c3f8
proftpd exploit for 1.2.0pre3 linux x86
6edee0d79957dc29f1b881883812df5000054566a9ed218b5d2bd52d14c2619a
cloak users utmp host entry
c0c9242b12e010e91bd24cd3baa34312c62ad75a6009c50c5b81b94971b8d773
very fast, clean and mean, but functional banner scanner, with part of the functionality of netcat :-)
8140faf86d4dda36aae57f79ae2a8d27be823118b76e22cf890009a8f15509cc
DoS ascend router with simple udp echo<->echo link
3e610f9dc41e66bc8418d2222d57f4c973771ed8591575ffdb3a1eb229546188
send arp packets useful for man-in-the-middle
2bcbf6fa27b752ae133601c819f5888407f0eb48006a7b7019b0fb3f0d7d7e7c
Delegate 5.9.x - 6.0.x remote exploit for Linux compilations
3ac439d6fef1daef6b26daf2115caeb6dfcdd0765feefc3734a19a6d5e9886a5
linux tty hijacker
1a7d638efbe39f49605381b9cc11b12ec8770a89dae4e2f9abcf4464e3dcc29b
wuftpd 2.5.0 heap-based exploit
c66bbfb8e83b185de65b90f0fbc1f1d1fc5a4716ed694916c9175686d5a745e2
lame libtermcap sploit
f015cdddacdb0e66de98f7c3c9494337480346b8db1aff3ac5d3b0ebd0a737f4